Category Archives: Secrecy

InsecurityWatch: Hyper, hacks, terror, bluster


We begin with the hyperbolic, via the Guardian:

US intelligence chief warns Congress of danger of failing to renew Patriot Act

  • Congress must accept responsibility if ‘untoward incident’ occurs
  • James Clapper also discusses Syria, Russia and North Korea

If Congress fails to renew a controversial provision of the Patriot Act by June, the director of national intelligence, James Clapper, says opponents of the bill on Capitol Hill should bear the blame if an otherwise preventable terrorist attack happens afterwards.

In a question-and answer-session at the Council on Foreign Relations in New York, Clapper reiterated his support for renewing Section 215 of the Patriot Act, which allows the FBI and NSA to collect domestic phone records in bulk, is set to expire on 1 June. He expressed this support strongly and pointed a finger at opponents of the legislation on Capitol Hill. Clapper, America’s top-ranking intelligence official, said if Congress decides not to renew the legislation and an “untoward incident” occurs as a result, he hopes “everyone involved in that decision assumes responsibility” and doesn’t just blame the intelligence community.

However, Clapper did indicate his support for the reforms proposed to Section 215 by Senator Patrick Leahy last year, which shift responsibility for retaining phone records to individual phone companies from the FBI. This proposal failed to receive the needed supermajority in the Senate for a final vote in 2014 on a near party-line vote where 41 Republicans and one Democrat opposed it.

From the Intercept, cognitive dissonance:

Bush White House’s Repeated Torture Denials Led CIA Torturers to Seek Repeated Reassurances

The Bush administration was so adamant in its public statements against torture that CIA officials repeatedly sought reassurances that the White House officials who had given them permission to torture in the first place hadn’t changed their minds.

In a July 29, 2003, White House meeting that included Vice President Dick Cheney and National Security Advisor Condoleezza Rice, CIA Director George Tenet went so far as to ask the White House “to cease stating that US Government practices were ‘humane’.” He was assured they would.

The memo describing that meeting is one of several documents that were unclassified last year but apparently escaped widespread notice until now. Georgetown Law Professor David Cole called attention to the trove of documents on the Just Security blog.

The documents were apparently posted in December at ciasavedlives.com, a website formed by a group of former senior intelligence officials to rebut the newly released Senate report that documented the horrors that CIA officers inflicted upon detainees and the lies about those tactics’ effectiveness that they told their superiors, would-be overseers and the public.

VICE News reminds:

Violence Caused by Far-Right Extremists Has Surpassed That Caused by Domestic Jihadists, Study Says

Since the September 11 attacks, the notion of terrorism has looked somewhat one-dimensional in United States public discourse, with the majority of Americans coming to think of political violence as the acts of organized, foreign groups — from al Qaeda in the early 2000s to Islamic State (IS) today.

This frequently one-dimensional understanding in the US of terrorism has led both the public and law enforcement to overlook a very different kind of homegrown threat — one posed by antigovernment radicals, white supremacists, and other domestic and far-right ideologues.

In both cases — radical Islamism and far right extremism — a majority of terrorist attacks on US soil have been at the hands of individual “lone wolves” acting outside established groups. But violence caused by far right extremism has surpassed that caused by domestic “jihadis,” according to a study published last month by the Southern Poverty Law Center (SPLC).

From the Los Angeles Times, no comment needed:

‘Jihadi John’ suspect took anger management classes, says teacher

The British-educated Muslim man now believed to be the notorious Islamic State killer “Jihadi John” reportedly took anger management classes as a student.

A teacher at Mohammed Emwazi’s high school told the BBC he used to get into fights as a teenager and had difficulty keeping his emotions in check.

“We would find that he would get very angry and worked up and it would take him a long time to calm himself down,” the teacher said, speaking on condition of anonymity for security sake, according to the BBC. “We did a lot of work as a school to help him with his anger and to control his emotions and it seemed to work.”

From the London Daily Mail, conclusion about biased cops behaving badly:

‘Racially biased’ Ferguson police sent emails laughing at black people and ticketed African Americans to make money before Michael Brown shooting, Justice Department report to reveal

  • Justice Department report due to be released later this week
  • Will find some white officials targeted black people in Ferguson, Missouri
  • Traffic tickets were used to boost police department’s coffers, officials say
  • Will also feature a racist joke circulated by officers via email
  • Expected to say attitude was ‘avoidable’ and created racial tension
  • Reached a climax when Michael Brown was fatally shot in August 2014

From the Associated Press, Attica! Attica!:

3 Attica guards plead guilty as assault trial about to begin

Three Attica prison guards charged with beating a jewelry thief until bones in his face and legs broke in 2011 pleaded guilty Monday in an agreement that will spare them jail time.

Keith Swack, Sean Warner and Matthew Rademacher admitted to misdemeanor charges of official misconduct as jury selection was about to begin for their trial in Wyoming County Court.

The guards, who had been suspended without pay since 2011, were given conditional discharges and agreed to resign.

“This is the first time in New York state history that a correction officer has been prosecuted and pleaded guilty to committing an unauthorized violent act to an inmate while on duty,” Wyoming County District Attorney Donald O’Geen said at a news conference.

A corporate media hack in Canada, via SecurityWeek:

Rogers Says Hackers Accessed Small Number of Business Accounts

A hacker group called TeamHans has leaked hundreds of megabytes of data allegedly stolen from the systems of Canadian communications and media company Rogers.

According to DataBreaches.net, the attackers leaked sensitive corporate information such as contracts, emails, documents, and even VPN data. TeamHans said it gained access to the information on February 20 after tricking support staff into changing the password for an employee’s email account.

The information found in the targeted employee’s email account led TeamHans to an online tool used by Rogers to manage contracts.

Hackable Microsoftness from SecurityWeek:

Internet Explorer Exploit Added to Angler Kit: FireEye

Hackers have modified an exploit for a vulnerability in Internet Explorer fixed last October and added it to a notorious exploit kit.

The vulnerability is a use-after-free issue patched in MS14-056, which fixed a total of 14 IE bugs altogether. According to FireEye Staff Research Scientist Dan Caselden, the exploit has been added to the Angler exploit kit. Angler is often associated with exploits for Internet Explorer, Adobe Flash Player and Microsoft Silverlight.

“The Angler Exploit Kit (EK) recently implemented a modified version of k33nteam’s exploit targeting the same patched vulnerability,” Caselden blogged. “This is interesting because it is the first instance we’ve seen of an attack in the wild targeting IE deployments that are using Microsoft’s new MEMPROTECT mitigations. It shows that exploit authors are still interested in attacking IE.”

MEMPROTECT (Memory Protector) was introduced by Microsoft in July to make it difficult for hackers to execute use-after-free attacks. While the mitigations are not unbeatable, they increased the difficulty for exploit authors developing new IE exploits as evidenced by the absence of new IE exploits discovered in the wild, Caselden blogged.

Beheadings and burnings as bad fund-raising PR, via the London Telegraph:

Donations dry up for Islamic State, says US spy chief

  • Brutal beheadings have shocked Middle East and many donors have withdrawn support

Donations to Islamic State jihadists have dramatically declined in the wake of brutal executions by the group that have shocked public opinion in the Middle East, the chief of US intelligence said Monday.

“I think there is change afoot in the Mideast,” said James Clapper, director of national intelligence, referring to perceptions of the IS group in the region.

“It’s not going to occur overnight. But I think these brutalities, publicized brutalities by ISIL (IS), beheadings, immolation and the like, have really had a galvanising effect even in the Mideast,” Clapper said at an event in New York organized by the Council on Foreign Relations.

As a result, donations to the extremists in Islamic countries were dropping off, according to Clapper. “There’s been a big decline,” he said.

From the New York Times, Clintonism at work:

Hillary Clinton Used Personal Email at State Dept., Possibly Breaking Rules

Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, State Department officials said, and may have violated federal requirements that officials’ correspondence be retained as part of the agency’s record.

Mrs. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act.

It was only two months ago, in response to a new State Department effort to comply with federal record-keeping practices, that Mrs. Clinton’s advisers reviewed tens of thousands of pages of her personal emails and decided which ones to turn over to the State Department. All told, 55,000 pages of emails were given to the department. Mrs. Clinton stepped down from the secretary’s post in early 2013.

After the jump, Isis threatens Twitter over blocks, the battle for Tikrit commences, more Aussie troops on the way, Saudi terrorist prisons a suite deal, Pakistan stages an Afghan mass expulsion, an ominous North Korean hint to Washington’s master spy, Pyongyang fires off demonstrative missiles, A Red Army military crackdown, Shinzo Abe spells out a Japanese foreign military agenda, and allegations of massive U.S. military rapes in Germany as World War II drew to a close. . . Continue reading

InSecurityWatch: Stalkers, hacks, war, spies, law


From the Observer, the worst of both worlds:

Spyware and malware availability sparks surge in internet stalking

  • Domestic violence experts warn malicious software is increasingly being used to compromise victims’ computers and phones

Domestic violence experts have warned that the use of specialist technology that enables abusers to stalk victims online and via mobile phones is growing at an alarming rate.

A series of parliamentary answers has revealed that, in the 12 months up to April 2014, police received 10,731 reports of computers being compromised by spyware and malware (malicious software). Both can be used by abusers to gather information from someone’s computer or phone. They can allow abusers to view documents, photographs or passwords – and even turn on a device’s camera or microphone. Mobile spyware can also reveal a person’s location.

The real number of victims is likely to be considerably higher. “As most victims are unaware that they are being watched or are too scared to come forward, the real number of incidents could be up to 10 times that,” said Harry Fletcher, criminal justice director of the Digital-Trust, a new charity set up to help victims of cyber abuse.

A spy with conviction, via BBC News:

Ex-Colombian spy chief Maria del Pilar Hurtado convicted

The former head of Colombia’s secret police, Maria del Pilar Hurtado, has been found guilty of spying on politicians, judges and journalists. The Supreme Court said Hurtado’s sentence would be announced in 15 days.

Those targeted in the spying, which occurred between 2007 and 2008, were all political opponents of Alvaro Uribe, who was president at the time.

His former chief of staff has also been convicted but Mr Uribe denies any knowledge of the illegal intercepts.

Cold War 2.0 expostulation, via the Guardian:

Former MI6 chief warns over Russian threat

John Sawers says defence spending needs to increase to counter Vladimir Putin’s actions and Europe needs to find a new way to coexist with Russia

Russia has become a greater threat to Britain, and defence spending needs to increase to counter Vladimir Putin’s actions, the former MI6 chief has warned.

Sir John Sawers, who stepped down in 2014 after five years of running the Secret Intelligence Service, said the threat posed by Moscow was “not necessarily directly to the UK but to countries around its periphery”.

“The real problem is how we live with a Russia which feels very exposed. Putin’s actions are ones of a leader who believes his own security is at stake,” he told BBC Radio 4’s Today programme on Saturday.

And from the New York Times, Cold War 1.0:

Cuba’s Designation as a Sponsor of Terrorism Snarls Negotiations With U.S.

More than a year ago, the State Department held a meeting with bankers and Cuban officials to deliver an unusual request: please accept Cuba’s money.

The one bank that did business with Cuban diplomats in Washington, M & T Bank of Buffalo, had announced that it would no longer serve foreign missions. Cuba could hardly shop around for a replacement, not least because it is on the American government’s list of nations that support terrorism — forcing Cuban diplomats in Washington to carry out many of their transactions with bundles of cash.

Now, Cuba’s spot on the American list of states that sponsor terrorism is emerging as a major sticking point in the effort to restore diplomatic ties with the United States and reopen embassies that have been closed for nearly five decades.

And so it continues, via the McClatchy Foreign Staff:

UN cites 2 ‘credible’ reports of torture at U.S. facilities in Afghanistan

The United Nations reported Wednesday that it had uncovered two credible accounts of torture at U.S. military facilities in Afghanistan in recent years during an investigation into the treatment of detainees.

The report, which was devoted primarily to mistreatment of prisoners held in Afghan custody, said the “credible and reliable” accounts came from two detainees who’d been held “in a U.S. facility in Maydan Wardak,” a province whose capital of Maidan Shar lies about 20 miles west of Kabul, and “a U.S. special forces facility at Baghlan,” a province that lies north of the Afghan capital.

The report quoted the prisoners as saying the mistreatment in Baghlan occurred in April 2013 and at Maydan Wardak in September 2013.

Torture as part of the U.S. war on terror has been a controversial issue. A recent report by the Senate Intelligence Committee outlined 20 cases of mistreatment of suspected terrorists held in secret CIA prisons, and U.S. soldiers have been accused of torturing Afghan prisoners, with the most notorious case being the death of Dilawar, an Afghan taxi driver who died after he was hung from the ceiling of his cell by his wrists and beaten in 2002.

But there have been few verified reports in more recent years, though Afghan authorities have accused Americans of abusing prisoners.

The New York Times covers the defense:

‘Jihadi John’ Stirs Britain to Defend Spy Agencies

After disclosures that the man who posed in videos of the murder of Western hostages was known to British intelligence, Prime Minister David Cameron on Friday defended the security services, saying they faced tough decisions and had prevented deadly attacks.

“All of the time, they are having to make incredibly difficult judgments, and I think basically they make very good judgments on our behalf,” Mr. Cameron said at a news conference.

“I think while we are in the middle of this vast effort to make sure British citizens are safe, I think the most important thing is to get behind them,” he said.

And from WMC Action News 5 in Memphis, a target:

Mid-South professor targeted by ISIS

A Mid-South professor is being targeted by ISIS, a group known for its gruesomeness.

“ISIS does not represent my faith, their actions are in contradiction to my faith, and I’m appalled at what they are doing in the name of my faith,” said Rhodes College professor of religious studies, and the Resident Scholar of the Memphis Islamic Center Yasir Qadhi.

ISIS is using its propaganda magazine in the name of Islam to call for the assassination of Qadhi.

“I was one two clerics that they targeted in their latest magazine, two American clerics, and basically called for my assassination,” said Qadhi. “And they have said this is an act of of worship…..that if somebody kills me, God is going to reward them.”

BBC News covers a designation:

Egypt court puts Hamas on terrorist list

An Egyptian court has listed the Palestinian group Hamas as a terrorist organisation, accusing it of supporting an insurgency in northern Sinai.

The ruling comes a month after a different court labelled the armed wing of Hamas as a terrorist group. Hamas, which controls the Gaza Strip, is an offshoot of Egypt’s Muslim Brotherhood – itself designated as a terrorist organisation in 2013.

Egypt’s Muslim Brotherhood President Mohammed Morsi was ousted that year. The court ruling on Saturday effectively bans Hamas within Egypt, a wider verdict that January’s censure of its armed wing.

From the New York Times, agitation:

Online, American Helps Fuel Attacks in Egypt

Writing from an online perch in Istanbul, he calls on Egyptians to start off-hour attacks against KFC restaurants, banks, mobile phone shops and other corporate outposts. He urges assaults on the military’s commercial interests instead of its security checkpoints.

Nonviolent protests are worse than “futile,” he says, just an opportunity “to get arrested or shot in an exercise in crowd control training for the police.”

This Internet provocateur is an American convert to Islam, Shahid King Bolsen, a college dropout who speaks only rudimentary Arabic and has barely set foot in Egypt. He has nevertheless emerged as the unlikely apostle for a distinctive blend of anti-globalization sloganeering and Islamist politics that is fueling a new wave of violence against businesses across the country.

From the Independent, a Saudi blogger’s fate worsens:

Raif Badawi, the Saudi Arabian blogger sentenced to 1,000 lashes, may now face the death penalty

Raif Badawi, the Saudi Arabian blogger whose punishment of 1,000 lashes has prompted international condemnation, may now face the death penalty.

Mr Badawi’s wife, Ensaf Haidar, told The Independent in a series of messages that judges in Saudi Arabia’s criminal court want him to undergo a re-trial for apostasy. If found guilty, he would face a death sentence.

She said the “dangerous information” had come from “official sources” inside the conservative kingdom, where Mr Badawi has already been sentenced to 10 years in prison and 1,000 lashes – administered at a rate of 50 per week – for criticising the country’s clerics through his liberal blog.

After the jump, terror porn and fundamentalist eBayism, China alleged to spy on nuclear power plants, Aussie women head off to ISIS, China’s Muslims increasingly targeted, Pegida marchers outnumbered by foes in Britain, a looted Iraqi museum reopens, more U.S. drone kills in Yemen, Cameroonians stage an anti-Boko Haram rally, a former Peruvian leader charged in a journalist’s killing, terror fears raise a free speech crackdown on the U.K. campus, civil libertarians fear Canada’s anti-terror legislation, and new Turkish laws evoke the police state specter, South Korea pushes Japan for Comfort Women resolution, a partisan challenge to Prime Minister Shinzo Abe’s security state push, and a call for cybersecurity coordination. . . Continue reading

InSecurityWatch: Spooks, hack, terror, geopolitics


We begin with the hardly unexpected, via BBC News:

UK spy watchdog ‘taken in’ by security agencies – MP

The committee monitoring the security services has been taken in by the “glamour” of spying and is failing to do its job, its founder has said.

Conservative MP David Davis said the Intelligence and Security Committee had been “captured by the agencies they are supposed to be overseeing”.

And ex-chairman Sir Malcolm Rifkind acted as a “spokesman” for MI5, MI6 and GCHQ rather than a watchdog.

From Deutsche Welle, the Macedonian panopticon sparks outrage:

Macedonia reels over evidence of Orwellian surveillance

Opposition allegations of massive wiretapping of more than 20,000 people imply that a small group linked to Prime Minister Nikola Gruevski controls Macedonia’s institutions, judiciary and media.

A large group of journalists gathered this week at the headquarters of the biggest opposition party in Macedonian capital Skopje. They were personally invited to pick up folders and documents – filled with transcripts of their telephone conversations over the past couple of years.

“Over a hundred Macedonian journalists were wiretapped in the past years,” opposition Social Democrat (SDSM) leader Zoran Zaev announced at minutes later. “These conversations show the link between the prime minister, the secret police and the media.”

The journalists’ phone transcripts were the fourth batch of such material released by Zaev’s SDSM this year. The opposition leader claims there is evidence that over 20,000 people were wiretapped as part of a system of media surveillance implemented by the prime minister, Nikola Gruevski, his cousin, the secret service chief, Saso Mijalkov, and a few other close associates.

National Journal covers the spooky pro forma:

NSA Spying Wins Another Rubber Stamp

  • Mass surveillance will continue for now, but is set to expire on June 1—unless Congress acts.

A federal court has again renewed an order allowing the National Security Agency to continue its bulk collection of Americans’ phone records, a decision that comes more than a year after President Obama pledged to end the controversial program.

The Foreign Intelligence Surveillance Court has approved a request to keep the NSA’s mass surveillance of U.S. phone metadata operating until June 1, coinciding with when the legal authority for the program is set to expire in Congress.

The extension is the fifth of its kind since Obama said he would effectively end the Snowden-exposed program as it currently exists during a major policy speech in January 2014. Obama and senior administration officials have repeatedly insisted that they will not act alone to end the program without Congress.

From SecurityWeek, nibbled to death by ducks:

US Spymaster Warns Over Low-level Cyber Attacks

A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital “armageddon,” US intelligence director James Clapper said on Thursday.

US officials for years have warned of a possible “cyber Pearl Harbor” that could shut down financial networks, poison water supplies or switch off power grids. But Clapper told lawmakers that American spy agencies were more focused on lower-profile but persistent assaults that could have a damaging effect over time.

“Rather than a ‘cyber Armageddon’ scenario that debilitates the entire US infrastructure, we envision something different,” Clapper told the Senate Armed Services Committee.

US Warns of Cyber Attacks”We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security,” he said.

Bloomberg covers allegations of Vegas hackery:

Iran Behind Cyber-Attack on Adelson’s Sands Corp., Clapper Says

The top U.S. intelligence official confirmed for the first time that Iran was behind a cyber attack against the Las Vegas Sands Corp. last year.

Identifying Iran as the perpetrator came more than a year after the Feb. 10, 2014, attack against the world’s largest gambling company, which crippled many of the computer systems that help run the $14 billion operation. Sands’ chairman and chief executive officer and top shareholder is billionaire Sheldon Adelson, a leading U.S. supporter of Israel and of Republican political candidates.

James Clapper, the director of national intelligence, told the Senate Armed Services Committee Thursday that the attack by Iran, followed by the hacking of Sony Corp. by North Korea in November, marked the first destructive cyber-assaults on the U.S. by nation-states. Iran’s role in the attack that crippled operations at several of Sands’ U.S. casinos was reported in December by Bloomberg Businessweek.

From RT, an Aussie cyberspook data bonanza proposed:

Australian metadata bill proposes phone, internet record storage for 2yrs

A new bill that would force Australian telecom firms to store clients’ personal data to help law enforcement agencies track down extremists conspiring to carry out acts of terrorism has attracted the scrutiny of analysts.

Committee chair, Liberal MP Dan Tehan, said the legislation forwards 38 recommendations to enhance safeguards.

“These recommendations, which are all bipartisan, will ensure that those mechanisms there operate efficiently and effectively and the public can be confident the regime is being used appropriately,” he said, as quoted by Sky News.

From the Independent, British Airways spies on its own:

British Airways spying scandal: How the world’s most famous airline spied on its own staff

British Airways paid £1m to hush up the details of a spying operation in which the phones and emails of its own cabin staff were allegedly improperly accessed during a bitter dispute with Britain’s largest union.

The payment was made to stop the union, Unite, suing BA over the operation by specialist investigators based at Heathrow. Unite claimed the private communications of 10 BA staff, some of whom were also union officials, were accessed during a period in 2011 when the airline faced renewed strike action.

The decision to deploy the airline’s in-house investigators, many of them former Scotland Yard and security services personnel, was taken at the highest level within BA, according to information given to The Independent. The use of effective espionage against members of a major UK union, by a flagship UK company worth close to £12bn, raises new questions about the scale of use of private investigators inside Britain’s largest companies.

Yet another router exploit, via Network World:

Hackers exploit router flaws in unusual pharming attack

An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim’s Web traffic.

The technique exploited security flaws in home routers to gain access to the administrator console. Once there, the hackers changed the routers’ DNS (Domain Name System) settings, a type of attack known as pharming.

Pharming is tricky to pull off because it requires access to an ISP’s or an organization’s DNS servers, which translate domain names into the IP addresses of websites. Those DNS systems are typically well-protected, but home routers often are not.

Security firm Proofpoint wrote in a blog post Thursday that launching the attack via email was a novel approach since pharming is normally a network-based attack.

From the Los Angeles Times, an Uber driver data breach:

Uber security breach may have affected up to 50,000 drivers

Thousands of Uber driver names and driver’s license numbers may be in the hands of an unauthorized third party due to a data breach that occurred last year, the ride-hailing company said Friday.

In a statement, Uber’s managing counsel of data privacy, Katherine Tassi, said the company discovered on Sept. 17, 2014, that one of its many databases could have potentially been accessed because one of the encryption keys required to unlock it had been compromised. Upon further investigation, it found the database had been accessed once by an unauthorized third party on May 13, 2014.

The company said it could not say how the security vulnerability was first discovered because the matter was under investigation.

After the jump, a French cartoon festival killed over terror fears, Muslims, Roma, and others, stage a philosemitic demonstration in Sweden, a leading Putin foe assassinated in Moscow, a former Mossad boss calls for a Netanyahu defeat, Pakistani vigilantes tackles ISIS and the Taliban, another historical revisionist heard from in Tokyo and the Pentagon sends in the Marines to join a Japanese landing drill, Abe and allies refine military moves abroad, more Japanese blowback from Abe’s agenda, and two Abe cabinet members under clouds of corruption suspicions, plus Kansas legislators threaten teachers with prison over “harmful” literature. . . Continue reading

A look at Al Jazzera’s espionage cable leaks


Al Jazeera’s Investigative Unit scored an impressive journalistic coup when they were handed a major cache of top secret cables and documents sent to South Africa by the Israeli, Russian, Australian, and other intelligence services, as well as from the South African State Security Agency.

In this, the first of two parts, Al Jazeera looks at the cables and their implications.

From Al Jazeera:

The Spy Cables: Decoded – Episode one

Program notes:

  • In the first of two programmes, we assess the impact of Al Jazeera’s release of hundreds of classified documents

    The Spy Cables captured headlines the world over – and was described as massive and unprecedented in newspapers as far afield as China as South America.

    Evidence that the Israeli Prime Minister Benjamin Netanyahu misled the United Nations lead news in a number of countries.

    The CIA’s desire to talk to Hamas; snooping on the head of Greenpeace; a plot to kill the head of the African Union; all grabbed global attention.

    In the first of two programmes, we assess the impact of Al Jazeera’s release of hundreds of classified documents – ranging from confidential to top secret – the widest-ranging leak of intelligence papers ever.

    Presenter: David Foster

    Guests:

  • David Maynier , in Cape Town – Member of South African Parliament and opposition Deputy Minister of State Security.
  • Justice Malala , in Johannesburg – political analyst
  • Ferial Haffajee , on set – the editor of the South African weekly newspaper, The City Press

InSecurityWatch: War, politics, hacks, terror. . .


And much more.

We begin the the latest round of the Great Game from the Washington Post:

Top U.S. intelligence official backs arming Ukraine forces against Russia

The top U.S. intelligence official said Thursday that he supports arming Ukrainian forces against Russian-backed separatists, as the Obama administration continues deliberations about whether to deepen involvement in a conflict pitting the West against Russian President Vladi-mir Putin.

James R. Clapper Jr., the director of national intelligence, said providing weapons to Ukraine would likely trigger a “negative reaction” from the Russian government, which Western officials are hoping will ensure that separatists stick to a European-brokered cease-fire that took effect this month.

“It could potentially further remove the very thin fig leaf of their position that they have not been involved in Ukraine,” Clapper told members of the Senate Armed Services Committee, adding that Russia could respond by sending more sophisticated weapons to separatist areas.

From RT, asserting a naval presence:

Russia secures military deal to use Cyprus’ ports despite EU concerns

Russian navy ships will keep having access to stop off at Cyprus’ ports in Mediterranean as the two countries have agreed to prolong the pre-existing deal on military cooperation.

The agreement, which applies to Russian vessels involved in counter-terrorism and anti-piracy efforts, was signed by President Vladimir Putin and his Cypriot counterpart, Nicos Anastasiades, in Moscow.

The signing came aimed heightened tensions and sanctions between Russia and the EU over the military conflict in Ukraine.

President Putin, however, stressed that the agreement, as well as Russia-Cypriot ”friendly ties aren’t aimed against anyone.”

From Agence France-Presse, how to keep them from droning on:

BLOG Drones

From Nextgov, what could possibly go wrong?:

CIA’s New Big Data Hub Will be Hosted in the Cloud

The CIA is preparing to take the next step in its quest to shake up the status quo of siloed agencies within the intelligence community.

CIA Chief Information Officer Doug Wolfe confirmed Wednesday the intelligence agency will start using Cloudera’s Enterprise Data Hub platform by April, a move he expects “to extend the innovation and push the envelope on a whole range of different solutions” for all 17 IC agencies.

The enterprise data hub, also known as a “data lake,” would presumably provide standardized data sets compiled by intelligence analysts across various agencies to decision-makers among many other features found in the company’s widely used open source big data platform.

From SINA English, a Chinese wall:

Some foreign tech brands removed from China government purchase list

CHINA has dropped some of the world’s leading technology brands from its approved state purchase lists, while approving thousands more locally made products.

Chief casualty is US network equipment maker Cisco Systems Inc, which in 2012 counted 60 products on the Central Government Procurement Center’s list, but by late 2014 had none, according to a Reuters analysis of official data.

Apple Inc has also been dropped over the period, along with Intel Corp’s security software firm McAfee and network and server software firm Citrix Systems.

An official at the procurement agency said there were many reasons why local makers might be preferred, including sheer weight of numbers and the fact that domestic security technology firms offered more product guarantees than overseas rivals.

From the Guardian, absence of evidence asserted:

No evidence of NSA and GCHQ Sim card hack, says allegedly compromised firm

  • Gemalto, the world’s largest Sim card manufacturer, denies claims intelligence services hacked into its servers and stole the keys to billions of mobile phones

The firm allegedly hacked by the NSA and GCHQ has stated that it cannot find any evidence that the US and UK security services breached and stole the encryption keys billions of Sim cards.

The alleged hack was revealed by documents from the NSA files provided by Edward Snowden, which detailed attacks on Gemalto – the world’s largest Sim card manufacturer – which allegedly saw them steal encryption keys that allowed them to secretly monitor voice calls and data from billions of mobile phones around the world.

But after an investigation, the Dutch security company, which supplies Sim cards to all of the major UK mobile phone networks and 450 operators globally, has said that no evidence of a theft of Sim card security details has been found.

From the Intercept, the sound of one hand clapping:

Gemalto Doesn’t Know What It Doesn’t Know

The company was eager to address the claims that its systems and encryption keys had been massively compromised. At one point in stock trading after publication of the report, Gemalto suffered a half billion dollar hit to its market capitalization. The stock only partially recovered in the following days.

After the brief investigation, Gemalto now says that the NSA and GCHQ operations in 2010-2011 would not allow the intelligence agencies to spy on 3G and 4G networks, and that theft would have been rare after 2010, when it deployed a “secure transfer system.” The company also said the spy agency hacks only affected “the outer parts of our networks — our office networks — which are in contact with the outside world.”

Security experts and cryptography specialists immediately challenged Gemalto’s claim to have done a “thorough” investigation into the state-sponsored attack in just six days, saying the company was greatly underestimating the abilities of the NSA and GCHQ to penetrate its systems without leaving detectable traces.

“Gemalto learned about this five-year-old hack by GCHQ when the The Intercept called them up for a comment last week. That doesn’t sound like they’re on top of things, and it certainly suggests they don’t have the in-house capability to detect and thwart sophisticated state-sponsored attacks,” says Christopher Soghoian, the chief technologist at the American Civil Liberties Union. He adds that Gemalto remains “a high-profile target for intelligence agencies.”

Target tally totaled, via SecurityWeek:

Target Data Breach Tally Hits $162 Million in Net Costs

The cost of the Target breach keeps on climbing.

According to the firm’s latest earnings report, the net expense of the breach stands at $162 million.

The actual total has now reached a gross expense of $191 million. That amount was partially offset by a $46 million insurance receivable in 2014. In 2013, the company’s gross expense related to the breach was $61 million, which was offset by a $44 million insurance payment. That brings the net expense of the breach for the retail giant to $162 million.

According to the Ponemon Institute’s ninth annual global study on data breach costs released last year, the average total price tag of a breach was $145 for every record stolen or lost – an increase of nine percent compared to the cost noted in the previous report. The study focused on 314 companies across 10 countries. All the companies that participated in the 2014 study had experienced a data breach ranging from a low of 2,400 compromised records to a high of slightly more than 100,000. The most expensive data breaches occurred in the U.S. and Germany, and cost $201 and $195 per compromised record, respectively.

From Threatpost, Anthem for more bad news:

Up to 18.8 Million Non-Anthem Customers Affected in Breach

In addition to roughly 80 million Anthem customers, nearly 20 million more individuals who aren’t customers of the health insurer could ultimately wind up implicated in this month’s massive data breach.

The company disclosed yesterday that between 8.8 million and 18.8 million Blue Cross Blue Shield customers’ records may have been storoed in the database that was hacked. Anthem is part of a network of independent BCBS plans, and the latest batch of affected customers may have used their BCBS insurance in states such as Texas or Florida where the company runs partnerships.

It’s the first time the company has disclosed information regarding the breach as it relates to data other than its own since the compromise was announced on Feb. 5.

From SecurityWeek, ad-hacking your wireless:

Researchers Spot Aggressive Android Adware on Google Play

Highly aggressive adware has been found hidden in ten Android applications hosted on Google Play, Bitdefender reported.

Adware is highly common on both desktop PCs and smartphones. However, the threats discovered by the security firm stand out not just because they are aggressive, but also because they employ clever tricks to stay hidden on the infected device.

Once installed, the apps redirect victims to a webpage, hosted at mobilsitelerim.com/anasayfa, which serves ads designed to trick users into installing other pieces of adware disguised as system or performace updates, or get them to sign up for premium services. The displayed ads differ depending on the user’s location, Bitdefender said.

“Although they’re not malicious per se, by broadcasting sensitive user information to third parties, they resemble aggressive adware found on desktop PCs. The resulting barrage of pop-ups, redirects and ads irks users and seriously damages both the user experience and the performance of Android devices,” Bitdefender security researcher Liviu Arsene explained in a blog post.

And from Threatpost, an enduring threat:

Ransomware Looming As Major Long-Term Threat

On May 30, 2014, law enforcement officials from the FBI and Europol seized a series of servers that were being used to help operate the GameOver Zeus botnet, an especially pernicious and troublesome piece of malware. The authorities also began an international manhunt for a Russian man they said was connected to operating the botnet, but the most significant piece of the operation was a side effect: the disruption of the infrastructure used to distribute the CryptoLocker ransomware.

The takedown was the result of months of investigation by law enforcement and security researchers, many of whom were collaborating as part of a working group that had come together to dig into CryptoLocker’s inner workings. The cadre of researchers included reverse engineers, mathematicians and botnet experts, and the group quickly discovered that the gang behind CryptoLocker, which emerged in 2013, knew what it was doing. Not only was the crew piggybacking on the GameOver Zeus infections to reach a broader audience, but it also was using a sophisticated domain-generation algorithm to generate fresh command-and-control domains quickly. That kept the CryptoLocker crew ahead of researchers and law enforcement for a time.

“The interesting thing is all the opsec involved in this. The architecture thought out with this was really clear. The people working on this really sat down and architected and then engineered something,” said Lance James of Deloitte & Touche, who spoke about the takedown effort at Black Hat last year. “It took a lot more people on our side to hit it harder.”

After the jump, Austria enacts an Islamic crackdown, on to the ISIS front, first with a spooky assessment, crowdsourcing an anti-ISIS army, and a ‘Jihadi John’ profile from Old Blighty its spooky origins, Yemeni Arab Spring activists see their hopes dim, a Boko Haram bombing body count, bomb-sniffing pachyderms deployed, on to Pakistan and an American blogger slain, thence to North Korea and Japanese sanctions threatened, Washington deploys its top airborne spycraft to the South China Sea, Japan’s already considerable military power, and Shinzo Abe engineers more overseas naval deployments, and eases more legal restrictions. . . Continue reading

InSecurityWatch: Leaks, hacks, crime, spooks


We begin with a twofer from Reuters:

South African spooks red-faced from latest spy data leak

A mass leak of South African espionage secrets will cause many foreign agencies to think twice before sharing information with Pretoria, hampering its efforts to walk a delicate diplomatic tightrope between East and West, experts said on Tuesday.

Britain’s Guardian paper and Gulf TV channel Al Jazeera said they had obtained hundreds of dossiers, files and cables from the world’s top spy agencies to and from South Africa, dubbing it “one of the biggest spy leaks in recent times”.

“A leak like this affects the credibility of the agencies and how they cooperate,” said Mike Hough, a retired professor from Pretoria University’s Institute for Strategic Studies. “It could lead to the termination of certain projects.”

From Al Jazeera, something many journalists have assumed for a half century:

Spy cables: Israel airline used as intelligence ‘front’

  • Leaked documents reveal South Africa challenged Mossad over alleged clandestine security operations under El Al cover.

Secret cables obtained by Al Jazeera’s Investigative Unit confirm that South Africa’s spy agencies concurred with allegations that Israel uses its flag-carrier, El Al Airlines, as cover for its intelligence agencies.

Leaked documents from South Africa’s intelligence agency support claims made on a 2009 South African television programme by a former El Al employee-turned-whistleblower.

Despite official Israeli denials, the whistleblower’s claims prompted an emergency meeting between senior officials from both sides, as well as a separate note of enquiry from Canada’s intelligence agency.

Another leak, via the Guardian:

Spy cables: Greenpeace head targeted by intelligence agencies before Seoul G20

  • South Korea’s intelligence service requested information about South African activist Kumi Naidoo in runup to leaders’ meeting in 2010

The head of Greenpeace International, Kumi Naidoo, was targeted by intelligence agencies as a potential security threat ahead of a major international summit, leaked documents reveal.

Information about Naidoo, a prominent human rights activist from South Africa, was requested from South African intelligence by South Korea’s National Intelligence Service (NIS) in the runup to a meeting of G20 leaders in Seoul in 2010.

He was linked in the intelligence request with two other South Africans who had been swept up in an anti-terrorist raid in Pakistan but later released and returned to South Africa.

And from Al Jazeera, faults revealed:

Spy Cables expose S Africa’s alarming security failings

  • Secret documents reveal an array of security lapses and flaws within South African government and intelligence.

South African government and security agencies have left secrets exposed at every level and foreign spies have access to all areas of government, according to Intelligence documents obtained by Al Jazeera’s Investigative Unit.

A secret security assessment by South African intelligence says foreign espionage is booming, with more than 140 foreign spies estimated to be operating in South Africa – and that the South African state is doing a poor job of protecting itself.

They are thought to have gained access to government departments, ministries and “even the presidency” and are suspected of breaking into nuclear power plants, stealing military blueprints and hacking computers.

The report slams poor security awareness among civil servants, who regularly failing to observe the most basic procedures, leaving classified information unlocked and failing to adequately vet new recruits.

From the Los Angeles Times, a major security fail:

State Department official arrested, suspected of soliciting sex from minor

A senior State Department official who oversees counter-terrorism programs has been arrested on suspicion of of soliciting sex from a minor, authorities in Virginia said late Tuesday.

Daniel Rosen was arrested at his home in Washington, D.C., just after noon and is being held in the city’s jail on suspicion of use of a communications device to solicit a juvenile, said Lucy Caldwell, spokeswoman for the Fairfax County Police Department.

According to his LinkedIn profile, Rosen, 44, is the director of counter-terrorism programs and policy for the State Department. Police said they have notified the State Department of his arrest.

A kindred failure across the pond, via the London Telegraph:

Sir Malcolm Rifkind to step down as MP and resigns from security committee

  • Tory MP Sir Malcolm Rifkind is to step down as an MP at the General Election and has also resigned as chairman of the Parliamentary Intelligence and Security Committee

Sir Malcolm Rifkind, the Conservative MP embroiled in cash for access allegations, is to step down as an MP at the General Election and has also resigned as chairman of the Parliamentary Intelligence and Security Committee.

Sir Malcolm was suspended by the Conservative Party pending an internal investigation on Monday after telling undercover reporters from The Telegraph and Channel 4’s Dispatches that he would use his position as a politician to help a fictitious Chinese company.

His decision to stand down as the Conservative MP for Kensington means there will be a contest for one of the Conservative Party’s safest seats.

The Guardian exposes a case of Chicago P.D. reality rising to film noir levels:

Chicago’s Homan Square ‘black site’: surveillance, military-style vehicles and a metal cage

  • This building looks innocent enough. But those familiar with the secretive interrogation and holding facility describe a shocking display of police abuses

From the outside, you have to concentrate to realize Homan Square is a police facility. At first glance, it’s an unremarkable red brick warehouse, one of a handful on Chicago’s west side that used to belong to Sears Roebuck, complete with roll-up aluminum doors. No prominent signage tells outsiders it belongs to the police. The complex sits amidst fixtures in a struggling neighborhood: a medical clinic, takeout places, a movie theater, a charter school.

But a look at what surrounds the warehouse gives clearer indications of Homan Square’s police business. The yellow barrier for cars at the street checkpoint. The vans in the motor pool marked Chicago Police Forensic Services parked next to the unmarked cars. The black-and-white checkered door to match the signature pattern on Chicago police hats. The floodlights on the roof. The guy with a gun walking outside and smoking a cigarette in a black windbreaker with POLICE written on the back.

Over the years Homan Square has formed a backdrop for high-profile drug seizures, where Chicago officials or cops display cocaine, marijuana and guns taken off the street. The rock group Portugal.The Man reportedly sent Homan Square detectives three dozen doughnuts – plus croissants and danishes – in gratitude for helping the band recover stolen music equipment.

But its interrogations function is less well known, even to close observers of Chicago police. Anthony Hill, an attorney, said he once made it into Homan Square, to the surprise of police, and said he saw “four, five cells,” describing it as a “bare-bones police station.

“When I got in, they were so shocked I was there they didn’t know what to do with me,” he said.

The Hill takes a profitable spin through the revolving spooky door:

NSA staffers rake in Silicon Valley cash

Former employees of the National Security Agency are becoming a hot commodity in Silicon Valley amid the tech industry’s battle against government surveillance.

Investors looking to ride the boom in cybersecurity are dangling big paydays in front of former NSA staffers, seeking to secure access to the insider knowledge they gained while working for the world’s most elite surveillance agency.
With companies desperate to protect their networks against hackers, many tech executives say the best way to develop security products is to enlist the talents of people who have years of experience cracking through them.

“The stories he could tell,” venture capitalist Ray Rothrock recalled about his meetings with a former NSA employee who founded the start-up Area 1 Security. “They come with a perspective that nobody in Silicon Valley has.”

From the Verge, from their resumes:

The NSA’s SIM heist could have given it the power to plant spyware on any phone

Last week, The Intercept published shocking new documents detailing a campaign by US and UK spies to hack into the SIM manufacturer Gemalto, stealing crucial encryption keys that protect and authenticate cellphone signals. But while it was clearly a major attack, I had a hard time seeing the operational benefits for the world’s spy agencies. SIM encryption only protects calls between your phone and the cell tower, which means any would-be surveillers would need to stay within a mile of the target. It’s also puzzling because carriers are often happy to hand over all their data with a blanket court order. Why would the GCHQ go to so much trouble for access to data they mostly already have?

But in the days since the report published, there’s been concern over an even more frightening line of attack. The stolen SIM keys don’t just give the NSA the power to listen in on calls, but potentially to plant spyware on any phone at any time. Once the stolen keys have bypassed the usual protections, the spyware would live on the SIM card itself, undetectable through conventional tools, able to pull data and install malicious software. If the NSA and GCHQ are pursuing that capability, it could be one of the biggest threats unearthed by Snowden so far.

Our earlier report focused on the Ki keys, used to encrypt traffic between the phone and the tower — but this new attack uses a different set of keys known as OTA keys, short for “over-the-air.” Each SIM card gets its own OTA key, typically used to remotely install updates. Manufacturers can send a binary text message directly to the SIM card, and as long as it’s signed with the proper OTA key, the card will install the attached software without question. If those keys were compromised, it would give an attacker carte blanche to install all manner of spyware. Researcher Claudio Guarnieri, who’s researched the Snowden documents extensively, says the OTA keys could make the Gemalto heist the most important news to come out of the documents so far. “It’s scary,” Guarnieri says. “If the NSA and GCHQ have obtained a large quantity of OTA keys, we’re facing the biggest threat to mobile security ever.”

From the Guardian, real class-y AT&T:

AT&T is putting a price on privacy. That is outrageous

  • Poor customers should not have to choose between being spied on and forking over money

Imagine if the postal service started offering discount shipping in exchange for permission to scan every letter you receive and then target you with junk mail based on the contents of your personal mail.

One of the largest telecommunications companies in America, AT&T, is doing just that for customers of its super-fast gigabit broadband service, which is rolling out in select cities. Though a few months ago, it dropped the use of an undeletable “supercookie” that tracked subscribers’ web browsing activity, AT&T reportedly plans to track and monetize its broadband customers’ internet activity – “webpages you visit, the time you spend on each, the links or ads you see and follow, and the search terms you enter” – to deliver targeted “ads online, via email or through direct mail”.

The tracking and ad targeting associated with the gigabit service cannot be avoided using browser privacy settings: as AT&T explained, the program “works independently of your browser’s privacy settings regarding cookies, do-not-track and private browsing.” In other words, AT&T is performing deep packet inspection, a controversial practice through which internet service providers, by virtue of their privileged position, monitor all the internet traffic of their subscribers and collect data on the content of those communications.

What if customers do not want to be spied on by their internet service providers? AT&T allows gigabit service subscribers to opt out – for a $29 fee per month.

After the jump, ghoulish corporate vultures follow our health concerns online, a Dutch university occupation evicted, Germans lose faith in democracy, the Anthem health data breach scope widens, widespread ongoing hack points persist in many aps, denial of service attacks target Google in Vietnam, on to the Mideast and an Assyrian Christian army mobilizing to fight ISIS, a Saudi apostasy death sentence, a Pakistani cell phone fingerprint requirement, pushing for a North Korean nuclear surrender, China raises NATO hackles with a missile sale to Turkey, Hong Kong delegates to the Beijing legislature call for a crackdown, Shinzo Abe aims for more power for military commanders, more Okinawan anger over an American military base move, and a Japanese human rights downgrade. . . Continue reading

InSecurityWatch: Leaks, hacks, spooks, war, ISIS


And more. . .

We begin with the first of a series of stories prompted by a major cache of secret cables handed over to the Al Jazeera Investigative Unit:

Mossad contradicted Netanyahu on Iran nuclear programme

Spy Cables reveal Mossad concluded that Iran was not producing nuclear weapons, after PM sounded alarm at UN in 2012

Less than a month after Prime Minister Benjamin Netanyahu’s 2012 warning to the UN General Assembly that Iran was 70 per cent of the way to completing its “plans to build a nuclear weapon”, Israel’s intelligence service believed that Iran was “not performing the activity necessary to produce weapons”.

A secret cable obtained by Al Jazeera’s Investigative Unit reveals that Mossad sent a top-secret cable to South Africa on October 22, 2012 that laid out a “bottom line” assessment of Iran’s nuclear work.

It appears to contradict the picture painted by Netanyahu of Tehran racing towards acquisition of a nuclear bomb.

Another Al Jazeera story:

Israeli cable reveals S Africa missile theft cover-up

  • Leaked Mossad cable shows Israel obtained stolen missile plans, and South Africa asked for their return

Next, the first of two headlines about the cables from the Guardian:

Spy cables: MI6 intervened to halt South African firm’s deal with Iranian client

  • Furnace maker was ‘advised most strongly’ to end contract with company suspected of being involved in weapons manufacturing

The next Guardian headline:

CIA attempted to contact Hamas despite official US ban, spy cables reveal

  • Leaked files show US ‘desperate to make inroads’ into Gaza as well as Barack Obama’s alleged threat to Palestinians over statehood

While the Daily Dot points out a non-deletion:

Al Jazeera error puts North Korean spy’s life on the line

Newly leaked documents show the British government attempting to recruit a North Korean spy—but journalists have failed to properly redact the cables, potentially putting the life of the North Korean and his family in grave jeopardy.

Al Jazeera, the Qatar-based news organization, published on Monday a leaked cable from the British Secret Intelligence Service outlining in great detail its attempt to bring a North Korean asset into a “long term clandestine relationship in return for payment.”

The four-page document was published with dozens of redactions, including the exact name of the North Korean individual in question.

However, the journalists left in key information. Dates and specific locations relating to where the North Korean individual met with British spies remains readable, vastly narrowing down the suspects North Korean authorities will no doubt be looking for.

Finally, a video summary for Al Jazeera America’s AJ+:

The Spy Cables – 4 Things We Learned From Leaked Documents

Program notes:

The Spy Cables are the largest release of intelligence documents since Edward Snowden’s and have been obtained exclusively by Al Jazeera’s investigative unit. They show us how spies spy on one another and also occasionally help each other spy on mutual enemies. South Africa’s spy agency and MI6 have worked together to shift a North Korean spy’s allegiance. Also, find out who South Korea considers a dangerous individual – the answer might surprise you.

Here’s the masterpage for the Al Jazeera Investigative Unit leak cache stories.

From the New York Times, playing politics to the heights of absurdity:

Concerns Mount as Homeland Security Shutdown Looks Likely

The notion that Congress might actually shut down the Department of Homeland Security as part of a broader fight over President Obama’s immigration policies seemed laughable just a few weeks ago.

Literally.

A top Republican staff member laughed when asked if Republicans, who are usually security-minded, were prepared to shut down the agency in a political battle over Mr. Obama’s recent executive actions.

But now, with just days remaining until funding for the Homeland Security agency runs out on Friday, a shutdown of the department is looking increasingly likely.

And from CNN, the usually unmentioned:

DHS intelligence report warns of domestic right-wing terror threat

  • They’re carrying out sporadic terror attacks on police, have threatened attacks on government buildings and reject government authority.

A new intelligence assessment, circulated by the Department of Homeland Security this month and reviewed by CNN, focuses on the domestic terror threat from right-wing sovereign citizen extremists and comes as the Obama administration holds a White House conference to focus efforts to fight violent extremism.

Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to — and in some cases greater than — the threat from foreign Islamic terror groups, such as ISIS, that garner more public attention.?

The Homeland Security report, produced in coordination with the FBI, counts 24 violent sovereign citizen-related attacks across the U.S. since 2010.

Network World covers a demand:

NSA director wants gov’t access to encrypted communications

It probably comes as no surprise that the director of the U.S. National Security Agency wants access to encrypted data on computers and other devices.

The U.S. should be able to craft a policy that allows the NSA and law enforcement agencies to read encrypted data when they need to, NSA director Michael Rogers said during an appearance at a cybersecurity policy event Monday.

Asked if the U.S. government should have backdoors to encrypted devices, Rogers said the U.S. government needs to develop a “framework.”

From Nextgov, a prognostication desideratum:

Spy Research Agency Is Building Psychic Machines to Predict Hacks

Imagine if IBM’s Watson — the “Jeopardy!” champion supercomputer — could answer not only trivia questions and forecast the weather, but also predict data breaches days before they occur.

That is the ambitious, long-term goal of a contest being held by the U.S. intelligence community.

Academics and industry scientists are teaming up to build software that can analyze publicly available data and a specific organization’s network activity to find patterns suggesting the likelihood of an imminent hack.

The dream of the future: A White House supercomputer spitting out forecasts on the probability that, say, China will try to intercept situation room video that day, or that Russia will eavesdrop on Secretary of State John Kerry’s phone conversations with German Chancellor Angela Merkel.

From the New York Times, documenting:

Document Reveals Growth of Cyberwarfare Between the U.S. and Iran

The document, which was written in April 2013 for Gen. Keith B. Alexander, then the director of the National Security Agency, described how Iranian officials had discovered new evidence the year before that the United States was preparing computer surveillance or cyberattacks on their networks.

It detailed how the United States and Britain had worked together to contain the damage from “Iran’s discovery of computer network exploitation tools” — the building blocks of cyberweapons. That was more than two years after the Stuxnet worm attack by the United States and Israel severely damaged the computer networks at Tehran’s nuclear enrichment plant.

And from the Washington Post, they want in on the action:

CIA looks to expand its cyber espionage capabilities

CIA Director John O. Brennan is planning a major expansion of the agency’s cyber espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

From the McClatchy Washington Bureau, what else to expect?:

Rejection of NSA whistleblower’s retaliation claim draws criticism

Thomas Drake became a symbol of the dangers whistleblowers face when they help journalists and Congress investigate wrongdoing at intelligence agencies. He claims he was subjected to a decade of retaliation by the National Security Agency that culminated in his being charged with espionage.

But when the Pentagon Inspector General’s Office opened an inquiry into the former senior NSA official’s allegations of retaliation in 2012, it looked at only two of the 10 years detailed in his account, according to a recently released Pentagon summary of the probe, before finding no evidence of retaliation. That finding ended Drake’s four-year effort to return to government service.

Whistleblower advocates say Drake’s experience, spelled out in a document McClatchy obtained this month through the Freedom of Information Act, underscores the problem that intelligence and defense workers face in bringing malfeasance to the surface. The agencies that are supposed to crack down on retaliation are not up to the task, especially when the alleged wrongdoing involves classified information, they charge.

From the Independent, debunking the justification for the new state security regime Down Under:

Tony Abbott admits there were 18 warning calls before Sydney attack

A national security hotline received 18 calls about “self-styled” cleric Man Haron Monis just days before he took 18 people hostage at a café in Sydney, a report into the siege has revealed.

The calls between 9 and 12 December last year all concerned material on his Facebook page.

Just three days later he was shot dead by police after a 17-hour siege which left two hostages dead along with Monis himself.

It was later revealed that the Iranian-born attacker, who had long been known to security services, was out on bail at the time of the attack.

And from VICE News, a failure to communicate North of the Border:

The Canadian Security Intelligence Service Refused to Tell Us How Much It Spent on an Unconstitutional Snooping Campaign

“We neither confirm nor deny that the records you requested exist. We are, however, advising you, as required by paragraph 10(1)(b) of the Act, that such records, if they existed, could reasonably be expected to be exempted.”

Translation: We’re not telling.

In January, VICE filed an Access to Information (ATI) request, asking for a slew of financial reports from the Canadian Security Intelligence Service. The specific documents we’re after are invoices for thousands, if not millions of payments made from various law enforcement bodies to Canada’s telecommunications companies.

For a decade, up until a surprise 2014 Supreme Court ruling, Canada’s investigators made informal requests to the country’s cellphone and internet providers for their customers’ personal information. They never had to go to a judge to make those requests. As an incentive, police paid nominal amounts of money per request—$1.50 here, $10 there—that they wouldn’t normally pay for requests authorized by a warrant.

After the jump, when your cell phone battery gives you away, more adware snooping enablement malfunctions, a bankster’s secrecy apologia, corporate espionage in the Indian oil biz, Obama’s promised Border Patrol reforms unfulfilled, Russian accusations of Western dominance aspirations, the Hitler-posing Pegida xenophobe reclaims his role, on to the Mideastern battlefield and a French carrier dispatched, signs that ISIS has deep roots, and the movement’s new English language schools, the emerging narrative on Libya, an embargo-busting Russian missile offering to Iran, the ISIS threat to Pakistan, a school assassination plotter nabbed, Myanmar captures rebel army bases, Japan’s Shnzo Abe makes a provocative insular move and South Korea responds, Japan plans more military attache deployments abroad, and a crown prince issue historical advice. . . Continue reading